General
-
Target
QUOTATION#09678.exe
-
Size
2.7MB
-
Sample
241031-r492faylbw
-
MD5
5b3703237f7103c30865e5297818ed6c
-
SHA1
80bbadedd0379f935e95fa329a1794cf6ac50bc2
-
SHA256
1773f8e303141bad880cc8143f1f75ddb7f6059241408c05be0b2986c90cad68
-
SHA512
f7f650fb7b2b508815b424b773a71de4627e43b38508924e9531cb05f770daa3c1cc0c562018a785249dc78e480654a0f96c01825da7c37d060016cacb0b57cd
-
SSDEEP
12288:AVLxvRktNny6moEXPc51VX90EePLa+ILVOAvR2QD:+VvANnytoEXKluPu+cvR2QD
Static task
static1
Behavioral task
behavioral1
Sample
QUOTATION#09678.exe
Resource
win7-20240903-en
Malware Config
Extracted
redline
nwa
94.141.120.6:55123
Targets
-
-
Target
QUOTATION#09678.exe
-
Size
2.7MB
-
MD5
5b3703237f7103c30865e5297818ed6c
-
SHA1
80bbadedd0379f935e95fa329a1794cf6ac50bc2
-
SHA256
1773f8e303141bad880cc8143f1f75ddb7f6059241408c05be0b2986c90cad68
-
SHA512
f7f650fb7b2b508815b424b773a71de4627e43b38508924e9531cb05f770daa3c1cc0c562018a785249dc78e480654a0f96c01825da7c37d060016cacb0b57cd
-
SSDEEP
12288:AVLxvRktNny6moEXPc51VX90EePLa+ILVOAvR2QD:+VvANnytoEXKluPu+cvR2QD
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
4